HOW TO BECOME A CLOUD SECURITY ARCHITECT in 2021 ? - Sriya Potham

HOW TO BECOME A CLOUD SECURITY ARCHITECT in 2021 ? - Sriya Potham

In this episode of the Virtual Coffee with Ashish edition, we spoke with Sriya Potham, Principal Cloud Security Architect

In this episode, Sriya & Ashish spoke about

  • What was your path into Cybersecurity?
  • Whats your definition of Cloud Security?
  • What is the shared responsibility model?
  • Whats a day in the life of a Cloud Security Architect ?
  • Are cloud architecture reviews different in different industries?
  • As a Cloud Security Architect do you need to focus on the GRC side?
  • Are CCM controls used quite often?
  • What soft and technical skills for you require to be successful as a Cloud Security Architect?
  • Is Cloud Security Architect a technical role?
  • Are certificates important to secure a Cloud Security Architecture role?
  • Does one need to consider doing CCSP?
  • Is architecture different when working with multi-cloud? Is it necessary to know both AWS and Azure?
  • What comes after certification ?
  • Do you need to be technical and have an operational understanding of the controls to give guidance?
  • Are some cloud service provider services not mature enough to be be used in organisations?
  • How do you transition from on premise security architect to cloud security architect?
  • How you get started if you have had no experience in Cloud?
  • Is it better to be experienced in different industries or be specialised in one as a Cloud Security Architect?
  • The difference between Cloud Security Architect and DevSecOps Architect? Can a person be both?
  • Is it valuable to do Comptia Security + ?
  • Is there a myth in cloud security that you hear often?
    • What are people not talking enough about in Cloud Security ?

ShowNotes and Episode Transcript on www.cloudsecuritypodcast.tv

Twitter - @kaizenteq @hashishrajan

If you want to watch videos of this and previous episodes:

- Twitch Channel: https://lnkd.in/gxhFrqw

- Youtube Channel: https://lnkd.in/gUHqSai

Jaksot(344)

5 Skills to Level Up Your Cloud Hacking

5 Skills to Level Up Your Cloud Hacking

BlackHat 2023 and Defcon 31 Roundup were the breeding ground for new and existing hackers to come together and share what to look out for in 2023 and 2024. The skills that stood out were - Identity - ...

7 Loka 202315min

Become a Cloud Native CISO in 2023

Become a Cloud Native CISO in 2023

Michael Piacente has been helping companies find Security Executives (CISO) for a long time for some household name companies like Lyft, Instacart, Airbnb and more . In episode we speak about his curr...

2 Loka 202337min

Software Supply Chain Controls for Terraform

Software Supply Chain Controls for Terraform

Understanding Software Supply Chain security threats for Terraform which has been the default for Infrastructure as Code is important. in this episode Mike Ruth is sharing his experience of working on...

21 Syys 202340min

Data Security RoadMap in 2023

Data Security RoadMap in 2023

DSPM or Data Security Posture Management with Yotam Segev from Cyera: Most security teams have known about data challenges in their organization and some of them are put in the too hard to solve right...

18 Syys 202317min

The Cloud to Code Dilemma - Let's Talk

The Cloud to Code Dilemma - Let's Talk

Is it code to cloud or cloud to code with Harshil Parikh from Tromzo: A lot of leaders today face the inevitable question of should i start with the code or the cloud first. Harshil Parikh from Tromzo...

9 Syys 202324min

CISO Perspective: Josh Lemos, CISO of Gitlab

CISO Perspective: Josh Lemos, CISO of Gitlab

Josh Lemos former CISO of Block and the current CISO of GitLab comes from a pentester background and made his way to become a CISO. We were lucky enough to interview him during the hacker summer camp ...

6 Syys 202320min

The Azure Cloud Security Pentesting Skills You NEED!

The Azure Cloud Security Pentesting Skills You NEED!

Karl Fosaaen, the author of Penetration Testing "Azure for Ethical Hacker" and the VP of Research at NetSPI, came as a guest to share why the penetration Test of a Web Application hosted on Azure Clou...

28 Elo 202329min

How to detect software supply chain attacks with Honeytokens?

How to detect software supply chain attacks with Honeytokens?

Can Honeytokens be used in your supply chain security? Turns out we can! We spoke to Mackenzie Jackson ( @advocatemack ) from  @GitGuardian  about the benefits of using Honeytokens, which organisation...

25 Elo 202319min